High-tech

High-tech
Light

Tuesday, December 31, 2013

How to...do just about anything in IT

---------- Forwarded message ----------
From: "Network World Daily PM News Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 30, 2013 4:03 PM
Subject: How to...do just about anything in IT
To: <aquarianm@gmail.com>
Cc:

How to get a job in financial IT

How to stay one step ahead of phishing attacks

Network World Daily News PM
December 30, 2013
Share this email

How to introduce Linux to your little kid

With my daughter nearing 3 years old, the topic of "how best to introduce a young kid to computers" has been on my mind a great deal. And since my home (and work) computing life revolves around Linux, the ideal is to introduce her to the wide, wonderful world of Linux and Open Source. There are really two big hurdles here. The first hurdle is to get her excited about it - truly interested in using...

READ MORE
 

Issue highlights

1. How to get a job in financial IT

2. INSIDER How to stay one step ahead of phishing attacks

3. How to customize Windows 8.1 Start screen and keyboard shortcut tricks

4. How to Get Your Documents Under Control

5. How to Keep Cloud-Based Data Safe

6. How to set up port forwarding

7. How to Mitigate Business Risk Using SAM and SLM Tools

8. How to trace a stolen MacBook: use Find My Mac to find stolen MacBook

9. How to Win the IT Infrastructure and Operations Talent War

10. How to change Windows 8.1 to local account with no Microsoft email account required

11. How to Sell on Facebook: Promote, Personalize and Engage

12. How to Use Analytics to Save Your IT Department

13. How to shove 50 meters of optical fiber into a microchip

14. How to create security awareness with incentives

15. How to build the ultimate imaginary Linux distro

16. How to use public Wi-Fi hotspots safely

17. How to Hack Your Own WiFi Network

18. How to get a handle on capacity management when workloads fluctuate wildly

19. How to prepare for cloud-based enterprise mobility management

20. How to secure passwords and other critical numbers

21. How to determine if your application is suitable for the cloud

RESOURCE COMPLIMENTS OF: Netop - NWW

Provide Secure Remote Support from a Browser

With enterprise-grade secure remote access solution, Netop Remote Control, you can connect to and support Windows devices from a web browser. To establish a connection, just launch your favorite browser, enter the IP address of the target device and your credentials. Learn more.

How to get a job in financial IT

IT pros may have shied away from financial services during the industry's recent upheavals, but it now represents a vibrant employment segment for those who understand its adherence to security, compliance and reliability. Insider (registration required) READ MORE

INSIDER

How to stay one step ahead of phishing attacks

Protecting yourself against phishing attacks used to be relatively easy. Don't download unexpected attachments. Visit banking websites directly instead of clicking on links in an email. And look for bad grammar. READ MORE

How to customize Windows 8.1 Start screen and keyboard shortcut tricks

Since some of you may be new to Windows 8.1 and may not have a touchscreen monitor for your desktop, then here are some handy tips, tricks and shortcut keys that will hopefully make your experience with the new OS somewhat less painful or frustrating. We'll start with the Start button where you can choose to customize your Windows 8.1 experience. Windows 8.1 Start button customizations READ MORE

How to Get Your Documents Under Control

An events-planning business moves from a time-consuming, manual process for creating documents to one that uses HP Relate templates. READ MORE

How to Keep Cloud-Based Data Safe

A real-estate brokerage opts to back up critical documents stored in Google Drive. READ MORE

How to set up port forwarding

For so many of us, networking hardware is a necessary evil. It's great when it works, but once it does, we just want to leave it alone. But if you've ever run into an app or service that requires "port forwarding" and have thrown up your hands in frustration, don't worry. I'm here to show you it's not so scary after all. READ MORE

How to Mitigate Business Risk Using SAM and SLM Tools

Most companies understand the risks associated with disaster recovery and business continuity and plan accordingly. Few can say the same thing about the software they own -- or don't own, as the case may be. That's where software asset management and software license management tools can make a difference. READ MORE

WEBCAST: Fortinet

How to Protect Tomorrow's Data Center Network

Data center networks, whether conventional or in the cloud, must handle ever-larger quantities of data. And those networks must provide access--securely--to an ever-broadening array of mobile devices. In this on-demand Webcast, you will learn how advanced firewall technology can enable you to meet these demands while keeping costs under control. Learn more >>

How to trace a stolen MacBook: use Find My Mac to find stolen MacBook

Your precious Apple laptop has been stolen, and you are bereft and angry. But all may not be lost. If you have Find My Mac enabled on your MacBook you can track it, lock it, and even message the oxygen waster who lifted your laptop. Here's how to trace a stolen MacBook. READ MORE

How to Win the IT Infrastructure and Operations Talent War

The future of your organization rests in the hands of your Infrastructure and Operations talent. Gartner lays out a battle plan to win the war for those tech pros. READ MORE

How to change Windows 8.1 to local account with no Microsoft email account required

Microsoft recently added three new security features to customer accounts: account recovery codes, recent account activity and more control over security notifications. After we look at that, we'll look at how to change your Windows 8.1 account to a local account without being tied to a Microsoft account, or any email address. Account recovery codes READ MORE

How to Sell on Facebook: Promote, Personalize and Engage

From letting Facebook users simply comment 'sold' to buy an item to engaging your customers, CIO.com looks at how a small business should invest in Facebook as a social commerce channel. READ MORE

How to Use Analytics to Save Your IT Department

As times change, so does the role of IT. A generation ago, it had to embrace PCs and client/server solutions. Now IT departments are faced with the consumerization of technology. Could the same analytics that helps companies predict customer behavior help IT departments stay relevant? READ MORE

How to shove 50 meters of optical fiber into a microchip

The Defense Advanced Research Projects Agency recently said its program to develop cutting edge photonics products has yielded two chips that can support long optical delays with low loss useful for a number of applications including wideband wireless systems, optical buffers for all-optical routing networks, and ultra-stable optical interferometers for sensing applications. READ MORE

How to create security awareness with incentives

One of the reasons many security awareness programs fail is that they rely on a "push" mentality, where they force employees to take awareness training and expect or, more likely, hope that employees will seek out additional training, because it is the right thing to do. While many there are programs that do this that are successful, they are relatively rare. READ MORE

WEBCAST: PC Connection

Achieve the Benefits of a Converged Infrastructure

Learn how the Dell PowerEdge VRTX and makes it possible to achieve the benefits of a converged infrastructure in a small office environment (small business, remote offices, or mobile environments) with this versatile, simple, and efficient platform. Learn More

How to build the ultimate imaginary Linux distro

Roughly a week back, I was at SUSECon, talking with a few fellow Linux nerds about all of the cool services and tools available for those that build their own Linux distributions. And this got me thinking. If I were to sit down, right now, and build a brand-new Linux distro... what tools would I use? What services would I utilize in order to create the best distro out there, and simultaneously make... READ MORE

How to use public Wi-Fi hotspots safely

Consider this: If you or an employee is using free Wi-Fi in some local café, in a matter of seconds a hacker can manipulate your machine into a "man-in-the-middle" scenario, where the device is now a conduit that sends data right to the bad guy. Once a device is compromised, login credentials (corporate mail server, bank accounts, LinkedIn.com, Facebook.com, etc.) can be harvested by using SSL Stripping. READ MORE

How to Hack Your Own WiFi Network

15 free (or almost free) Wi-Fi penetration testing tools READ MORE

How to get a handle on capacity management when workloads fluctuate wildly

Capacity management was relatively easy when workloads grew incrementally, but those days are gone. Customer-facing Web and mobility services can spike unpredictably, and Big Data workloads can quickly overwhelm existing capacity. In this new world of wild workload fluctuations, IT has to do a better job of managing capacity. READ MORE

How to prepare for cloud-based enterprise mobility management

What's the fastest, easiest, low-cost way for your organization to achieve multi-platform enterprise mobility management (EMM) without sacrificing security or performance? Using the cloud, of course. Here are tips to help you on that journey. READ MORE

How to secure passwords and other critical numbers

One of the more frustrating exercises in using anything online is keeping your passwords safe. They have to be easy to remember and hard to guess. READ MORE

How to determine if your application is suitable for the cloud

...

No comments:

Post a Comment